Application Security News and Articles


UK Cybersecurity Weekly News Roundup – 23 March 2025

Welcome to this week's edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. NHS Scotland Confirms Cyberattack Disruption On 20 March 2025, NHS Scotland reported a major cyber ...

How can I integrate NHI logging and auditing into our IAM solution?

Have You Considered the Crucial Role of Non-Human Identities (NHIs) in Your IAM Solution? Enterprise data management has taken an exciting twist with the integration of Non-Human Identities (NHIs) in Identity and Access Management (IAM) ...

How do I streamline NHI onboarding in identity management systems?

Are you effectively managing Non-Human Identities in your organization? In the quest to navigate the cloud’s labyrinthine complexities, one aspect often overlooked is the management of Non-Human Identities (NHIs). NHIs, the machine identities ...

Why SAST is a Must-Have Skill for AppSec Professionals!

Understanding SAST gives you an edge because it allows you to: Peek into the code where developers add validation (and find ways to bypassContinue reading on Medium »

DEF CON 32 – Recon Village – Recon MindMap: Organize, Visualize & Prioritize Recon Data

Speaker: Lenin Alevski Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

Best Ways to Get sAST Today

A breakdown of the best strategies for acquiring sAST.Continue reading on Medium »

Week in review: Veeam Backup & Replication RCE fixed, free file converter sites deliver malware

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120) Veeam has released fixes for a critical remote ...

How can I monitor NHI activities within my IAM system?

Is Monitoring Non-Human Identities (NHIs) in Your IAM System Crucial? Ensuring the security of your data and systems is a top priority for all organizations operating. One of the key players in this arena that often goes unnoticed is Non-Human ...

What solutions offer centralized management for NHIs within IAM?

Are Centralized Management Solutions the Key to Mastering Non-Human Identities Within IAM? For enterprises operating, managing Non-Human Identities (NHIs) within Identity and Access Management (IAM) remains a critical requirement. But how can ...

How to Build Wealth with AirSwap $sAST

Steps to Turn Your AirSwap $sAST Staking into a Wealth-Building StrategyContinue reading on Medium »

DEF CON 32 – Recon Village – OSINT at Clemson: Unmasking John Mark Dougan’s Disinformation Empire

Speaker: Steven Sheffield Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

My Glittering Media Career

I was overjoyed to hear from Doctor Xand on Morning Live today, on how I can improve my lifestyle so that I can count on my knees. On the whole, though, I think I’ll carry on counting on my fingers.* But what is this thing about people on TV ...

CVE-2025-24813: Apache Tomcat Vulnerable to RCE Attacks

IntroductionCVE-2025-24813 was originally published on March 10 with a medium severity score of 5.5, and Apache Tomcat released an update to fix it. On March 12, the first attack was detected in Poland by Wallarm researchers, even before a ...

HIPAA Security Rule Amendment: Key Public Comments and Next Steps

Major cybersecurity breaches continue to plague the US healthcare industry, and on December 27, 2024, the U.S. Department of Health and Human Services (HHS) issued a Notice of Proposed Rulemaking (NPRM) to amend the HIPAA Security Rule, titled ...

How can legacy IAM systems be updated to support NHIs?

Could Your Legacy IAM Be The Achilles Heel of Your Cybersecurity? When security breaches and data leaks proliferate, organizations grapple with the rising challenge of protecting their digital assets. This is particularly true for organizations ...

What role do NHIs play in modern identity and access management?

How Vital is the Role of Non-Human Identities in Identity and Access Management (IAM)? Have you ever wondered how digital machinery and applications gain access to our systems? The answer lies in Non-Human Identities (NHIs), a critical, yet often ...

How do I ensure secure authentication for NHIs in an IAM system?

Is Your IAM System Adequately Protecting Non-Human Identities? Non-Human Identities (NHIs) are one such intricacy that has increasingly made its way into IAM (Identity Access Management) systems. However, the question remains: How do we ensure ...

StateRAMP Fast Track: How to Speed Up Authorization

Governmental cybersecurity is largely focused on federal government agencies. When we talk about FedRAMP, CMMC, DFARS, and other security standards, it’s almost always with an eye toward the governmental agencies and departments that comprise ...

DEF CON 32 – Recon Village – Pushing the Limits of Mass DNS Scanning

Speaker: Jasper Insinger Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the ...

A Pragmatic Approach to Effective Security

Cybersecurity is constantly evolving, and staying ahead of threats requires more than just tools—it demands strategy, leadership, and expertise. The unfortunate reality is that the threat landscape affects all companies regardless of industry ...